About your Search

20120928
20121006
Search Results 0 to 1 of about 2
in that environment? is it too unstable of an environment for effective security exercise to continue? your thoughts on that. >> i appreciate that question. in 2001, i voted to authorize use of mill tear force in afghanistan. in the days and months following the nen attacks on the united states. it was a very clear and focused megs to go after those who planned and executed that attack. and i believe our brave men and women who went to afghanistan, very capably fulfilled that mission, frankly in fairly short order. i was in afghanistan in august of 2010, in kabul and at bagram air force base. i met with wisconsin soldiers and -- soldiers and folks in the military from the senior ranks to the tissue to those coming back from forward operating bases. you would be so proud of those men and women, but the mission today this nation building mission, is not the one that was authorized. it is now time for them to come home. >> governor thompson? >> my opponent just, i think, misstated. she said she voted for the sanctions against iran. she voted against the sanctions in 2006, 2009, and 2010 and in august s
, and resilient cyber environment. we must work internationally because the cyber criminals do not respect traditional national boundaries. attacks can and do to emanate from any place around the world. last may the united states released a new international strategy for cyberspace to help provide a blueprint for building an international framework to make sure cyberspace more secure and reliable. much remains to be done in this area, as the need for sustained international engagement becomes more apparent every day. as much as we have done, there's still a lot of work to do, because of threats to cybersecurity are real, serious, and the eve of rapidly. together we can and we must maintain a cyberspace that is safe and resilience that remains a source of tremendous opportunity and growth for years to come. to that end, we need to work more effectively with the private sector to tackle the difficult challenges -- first, real time information sharing between the public and private sectors, and second, whiter adoption of cybersecurity best practices for the nation's critical infrastructure. i
Search Results 0 to 1 of about 2